These terms have entered our lexicon. But what exactly do they refer to?

Recent news events show that we are in a period where the terminology we use to refer to security shortfalls is in flux.

Target, Home Depot and JPMorgan Chase clearly suffered major data breaches. So did Apple’s iCloud, Dropbox and Snapchat. Or so we thought.

Apple, Dropbox and Snapchat have refuted being directly hacked. And strictly speaking, each is right. Hackers may have sniffed Hollywood A-listers’ iCloud usernames and passwords over an open WiFi network at a celebrity event. And data apparently was leaked from third-party apps that piggyback onto Dropbox and Snapchat.

The distinction here is that the parent company’s databases were not directly compromised. In the case of iCloud, the celebrity users may have exposed themselves by not paying closer attention to their digital footprints. And in the case of Dropbox and Snapchat, the breach occurred at the wild and wooly collection of third-party apps that tie into the big name services.

Similarly, Heartbleed and Shellshock are two of the nastiest Internet-wide vulnerabilities ever to come to light. Heartbleed exposes the OpenSSL protocols widely used by website shopping carts. And Shellshock enables a hacker to take control of the module used to type text-based commands on Linux, Unix and Mac servers.

But what exactly was it that allowed ethical hacker Bryan Seely, of Seely Security, to access giant bond insurer MBIA’s customer financial accounts? Seely has also been able to tap into the Internet-facing Oracle servers of at least 8,000 other large organizations, including two Ivy League schools.

So was it one of these Internet-wide vulnerabilities that Seely manipulated? Not at all. Seely simply discovered that each organization misconfigured Oracle server software in a way that allowed the servers to be indexed—and thus made searchable—by Google and the Shodan search engine.

Free Credit Consultation - Call 844-346-3296

Confusing Context

The implications of this are profound. It means anyone who takes the time to learn the finer points of conducting Google and Shodan searches can find and access misconfigured Oracle servers at thousands of clueless organizations.

“Our lexicon doesn’t have enough words to describe every flavor of information compromise, so we call every such incident a breach,” says Tal Klein, vice president of strategy at cloud security company Adallom. “This is a huge problem because it makes it very hard for the average person to understand exactly what their personal risk is in the context of each event.”

Our networks are getting ever more complex. Meanwhile, emerging threats are expanding and intensifying. In this mix, poor security practices remain the rule, not the exception. IBM Security Services’ 2014 Cyber Security Intelligence Index shows human error to be a contributing factor in 95% of security incidents. That includes misconfigurations, lax patch management and use of weak passwords.

Meanwhile, no one in the security community expects discoveries of serious design flaws—known as zero-day vulnerabilities—to slow down any time soon.

“All software is buggy and vulnerable. Developers are under pressure to deliver more, faster so they take shortcuts and make mistakes,” says Chris Goettl, principal manager at vulnerability management firm Shavlik. “The reality is that vulnerabilities like the Heartbleed and Shellshock exist because software is only as secure as we can make it.”

Indeed, Heartbleed and Shellshock show how programming decisions made a decade ago, before social media and the Internet of Things, now translate into fresh turf for a willing and able cyber underground.

Get Your Free Credit Score & Monitoring

Shellshock Attacks

Since the initial Shellshock vulnerability was reported Sept. 24, website security vendor Incapsula has blocked more than 310,000 attempts to exploit the Shellshock flaw on its clients’ websites, at one point as many as 1,860 attacks per hour.

Only 6% of that traffic appeared to be legitimate security scans. “An overwhelming 94% was some form of attack,” says Incapsula co-founder Marc Gaffan. “Specifically, these were scans by hackers, server highjack attempts, and DDoS malware seeding. The highjack attempts were the most immediately troubling, comprising about 20% of the total.”

Probes to take advantage of Heartbleed and Shellshock have the earmarks of being backed by organized crime. There is another tier of much less sophisticated thieves and pranksters having a grand time probing weaknesses arising from the mishmash of partnerships and sharing attendant to social media services, such as iCloud, Dropbox and Snapchat.

Use common sense. Guard you sensitive data and photos. Don’t give sweeping permissions to trivial apps. Don’t use the same username and password on multiple accounts.

And if you run a business, engrain security into your business plan. Advises Klein: “Start being strategic about vulnerability mitigation; perform an audit of open source technologies your infrastructure is built on; have good patching hygiene as a de facto standard; assign engineering resources to participate in the development and maintenance of these projects.”

More on Identity Theft:

Sign up for our weekly newsletter.

Sign up for our Credit Report Card and receive the latest tips & advice from our team of 50+ credit and money experts as well as a FREE Credit Score and action plan. Sign up now.

Byron Acohido is a Pulitzer-winning journalist and one of the nation’s most respected cybersecurity and privacy experts. He is the Editor-in-Chief of ThirdCertainty.com.

Acohido is a native of the 50th state of Hawaii. He graduated from Damien Memorial High School in Honolulu and the University of Oregon School of Journalism, and also practiced journalism at The Herald, of Everett, WA, and the Dallas Times Herald. He also taught college courses at the University of Alaska Anchorage as the Atwood Chair of Journalism. He is highly-regarded in tech, journalism, government and academia as an author, analyst, instructor and public speaker dedicated to fostering fresh thinking and fruitful discussions about cybersecurity and privacy.

Comments on articles and responses to those comments are not provided or commissioned by a bank advertiser. Responses have not been reviewed, approved or otherwise endorsed by a bank advertiser. It is not a bank advertiser's responsibility to ensure all posts and/or questions are answered.

Please note that our comments are moderated, so it may take a little time before you see them on the page. Thanks for your patience.

Certain credit cards and other financial products mentioned in this and other sponsored content on Credit.com are Partners with Credit.com. Credit.com receives compensation if our users apply for and ultimately sign up for any financial products or cards offered.

Hello, Reader!

Thanks for checking out Credit.com. We hope you find the site and the journalism we produce useful. We wanted to take some time to tell you a bit about ourselves.

Our People

The Credit.com editorial team is staffed by a team of editors and reporters, each with many years of financial reporting experience. We’ve worked for places like the New York Times, American Banker, Frontline, TheStreet.com, Business Insider, ABC News, NBC News, CNBC and many others. We also employ a few freelancers and more than 50 contributors (these are typically subject matter experts from the worlds of finance, academia, politics, business and elsewhere).

Our Reporting

We take great pains to ensure that the articles, video and graphics you see on Credit.com are thoroughly reported and fact-checked. Each story is read by two separate editors, and we adhere to the highest editorial standards. We’re not perfect, however, and if you see something that you think is wrong, please email us at editorial team [at] credit [dot] com,

The Credit.com editorial team is committed to providing our readers and viewers with sound, well-reported and understandable information designed to inform and empower. We won’t tell you what to do. We will, however, do our best to explain the consequences of various actions, thereby arming you with the information you need to make decisions that are in your best interests. We also write about things relating to money and finance we think are interesting and want to share.

In addition to appearing on Credit.com, our articles are syndicated to dozens of other news sites. We have more than 100 partners, including MSN, ABC News, CBS News, Yahoo, Marketwatch, Scripps, Money Magazine and many others. This network operates similarly to the Associated Press or Reuters, except we focus almost exclusively on issues relating to personal finance. These are not advertorial or paid placements, rather we provide these articles to our partners in most cases for free. These relationships create more awareness of Credit.com in general and they result in more traffic to us as well.

Our Business Model

Credit.com’s journalism is largely supported by an e-commerce business model. Rather than rely on revenue from display ad impressions, Credit.com maintains a financial marketplace separate from its editorial pages. When someone navigates to those pages, and applies for a credit card, for example, Credit.com will get paid what is essentially a finder’s fee if that person ends up getting the card. That doesn’t mean, however, that our editorial decisions are informed by the products available in our marketplace. The editorial team chooses what to write about and how to write about it independently of the decisions and priorities of the business side of the company. In fact, we maintain a strict and important firewall between the editorial and business departments. Our mission as journalists is to serve the reader, not the advertiser. In that sense, we are no different from any other news organization that is supported by ad revenue.

Visitors to Credit.com are also able to register for a free Credit.com account, which gives them access to a tool called The Credit Report Card. This tool provides users with two free credit scores and a breakdown of the information in their Experian credit report, updated twice monthly. Again, this tool is entirely free, and we mention that frequently in our articles, because we think that it’s a good thing for users to have access to data like this. Separate from its educational value, there is also a business angle to the Credit Report Card. Registered users can be matched with products and services for which they are most likely to qualify. In other words, if you register and you find that your credit is less than stellar, Credit.com won’t recommend a high-end platinum credit card that requires an excellent credit score You’d likely get rejected, and that’s no good for you or Credit.com. You’d be no closer to getting a product you need, there’d be a wasted inquiry on your credit report, and Credit.com wouldn’t get paid. These are essentially what are commonly referred to as "targeted ads" in the world of the Internet. Despite all of this, however, even if you never apply for any product, the Credit Report Card will remain free, and none of this will impact how the editorial team reports on credit and credit scores.

Your Stories

Lastly, much of what we do is informed by our own experiences as well as the experiences of our readers. We want to tell your stories if you’re interested in sharing them. Please email us at story ideas [at] credit [dot] com with ideas or visit us on Facebook or Twitter.